Breaking News

How to Hack and Decrypt WhatsApp Database on rooted devices

The post includes a detailed procedure to hack and decrypt WhatsApp Database remotely on rooted Android mobile devices. Very Interesting!…

10 years ago

Fareit malware avoids detection using a different file hash for each attack

Security experts at Cisco Talos have discovered a new strain of the Fareit Info stealer that uses a different File…

10 years ago

Hacking drones by exploiting design flaws

At the Virus Bulletin 2015 conference, the security researcher Oleg Petrovsky detailed methods that can be used to hack drones…

10 years ago

IT Security in SMEs: Guidelines published by UNICRI

The UNICRI published in September a new study about the security of Italian small and medium enterprises (SMEs), which are…

10 years ago

Security Affairs newsletter Round 29 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

10 years ago

Bogus PayPal App used to spread a banking Trojan

Security experts at Trend Micro have uncovered a spam campaign spreading a bogus PayPal app to steal German users' banking…

10 years ago

Who is the unknown buyer that bought Adblock Extension

The creator of the popular Adblock Extension made a shocking revelation, the company has been sold to an unknown buyer.…

10 years ago

US state police cars are vulnerable to cyberattack

Virginia State Police (VSP) launched a project to test the resilience to cyber attacks of police cars (models 2012 Chevrolet…

10 years ago

Scottrade data breach affects 4.6 Million Customers

Online stock brokerage Scottrade has suffered a major data breach that exposed the personal information of 4.6 million customers. Data…

10 years ago

Patreon crowdfunding site hacked and data leaked online

The Crowdfunding website Patreon has been hacked and about 15 gigabytes of data including names, addresses and donations have been…

10 years ago

This website uses cookies.